A cyber security approach or model that considers all entities requiring access to organization network resources as untrusted and requires all entities to authenticate and be authorized before accessing network resources.

Takeaways from the talk:

  • A new approach that aims to minimize cyber security threats to organizations by never trusting any entity requiring access and increasing threat monitoring. a shift from the traditional trust but verified security approach

April 12 @ 15:15
15:15 — 16:00 (45′)

Timothy Mar